Sugata Sanyal

Learn More
The intrusion detection system architecture commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. In this paper, two machine-learning paradigms, artificial neural networks and fuzzy inference system, are used to design an intrusion detection system. SNORT is used to perform(More)
The analogy between immune systems and intrusion detection systems encourage the use of artificial immune systems for anomaly detection in computer networks. This paper describes a technique of applying artificial immune system along with genetic algorithm to develop an intrusion detection system. Far from developing primary immune response, as most of the(More)
A Mobile Ad-Hoc Network (MANET) is a selfconfiguring network of mobile nodes connected by wireless links to form an arbitrary topology without the use of existing infrastructure. In this paper, we have studied the effects of various mobility models on the performance of two routing protocols Dynamic Source Routing (DSRReactive Protocol) and(More)
Neurodevelopmental disorders such as intellectual disability, autism spectrum disorder and schizophrenia lack precise boundaries in their clinical definitions, epidemiology, genetics and protein-protein interactomes. This calls into question the appropriateness of current categorical disease concepts. Recently, there has been a rising tide to reformulate(More)
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. This paper evaluates three fuzzy rule based classifiers for IDS and the performance is compared with decision trees, support vector machines and linear genetic programming. Further,(More)
In an ad hoc wireless network where wired infrastructures are not feasible, energy and bandwidth conservation are the two key elements presenting challenges to researchers. Limited bandwidth makes a network easily congested by the control signals of the routing protocol. Routing schemes developed for wired networks seldom consider restrictions of this type.(More)
The paper introduces particle swarm optimization as a viable strategy to find numerical solution of Diophantine equation, for which there exists no general method of finding solutions. The proposed methodology uses a population of integer particles. The candidate solutions in the feasible space are optimised to have better positions through particle best(More)
Cloud Computing holds the potential to eliminate the requirements for setting up of highcost computing infrastructure for the IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. This would allow many-fold increase in the capacity or(More)
Mobile Ad Hoc Network (MANET) is a dynamic multihop wireless network which is established by a set of mobile nodes on a shared wireless channel. One of the major issues in MANET is routing due to the mobility of the nodes. Routing means the act of moving information across an internet work from a source to a destination. When it comes to MANET, the(More)